Sciweavers

80 search results - page 8 / 16
» Refactoring a Legacy System Using Components
Sort
View
KBSE
2007
IEEE
14 years 1 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
14 years 23 days ago
Automatic Mediation between Incompatible Component Interaction Styles
Incompatibility of component interaction styles is identified as a major obstacle to interoperability when using off-the-shelf components or dealing with legacy software in compos...
Klaus-Peter Löhr
JSS
2002
84views more  JSS 2002»
13 years 7 months ago
The impact of component architectures on interoperability
Component interoperability has become an important concern as companies migrate legacy systems, integrate COTS products, and assemble modules from disparate sources into a single ...
Leigh A. Davis, Rose F. Gamble, Jamie Payton
ICECCS
1995
IEEE
100views Hardware» more  ICECCS 1995»
13 years 11 months ago
POSD-a notation for presenting complex systems of processes
When trying to describe the behaviour of large systems, such as the business processes of large enterprises, we often adopt diagramming techniques based on derivatives of data flo...
Peter Henderson, Graham D. Pratten
ACSD
2005
IEEE
90views Hardware» more  ACSD 2005»
14 years 1 months ago
Extensible and Scalable Time Triggered Scheduling
The objective of this paper is to present how to design a system that can accommodate additional functionality with either no changes to the design or adding architectural modules...
Wei Zheng, Jike Chong, Claudio Pinello, Sri Kanaja...